Unlock instant, AI-driven research and patent intelligence for your innovation.

A Method for Encrypting Latitude and Longitude Coordinates

A longitude, latitude and longitude technology, applied in satellite radio beacon positioning systems, instruments, measuring devices, etc., can solve the problems of inability to restore longitude and latitude information, slow speed, and inability to use MD5 one-way encryption algorithm.

Active Publication Date: 2021-05-14
CENNAVI TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Use various two-way encryption algorithm libraries, such as RES, AES, RSA, DSA, etc., but the problem is that the speed is slow, and the MD5 one-way encryption algorithm cannot be used at the same time. The latitude and longitude information cannot be encrypted in this way, otherwise The decryption party cannot restore the real latitude and longitude information
But it cannot be applied to the encryption of latitude and longitude coordinates

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method for Encrypting Latitude and Longitude Coordinates
  • A Method for Encrypting Latitude and Longitude Coordinates

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] As above, the same encryption method can be used to encrypt the GPS data of the second point, that is, each GPS point is encrypted using the same algorithm.

[0030] That is: from the first point, the longitude data of GPS and the string p of latitude data after encryption are, p={the longitude data after the first point GPS encryption, the latitude data after the first point GPS encryption, the second point GPS Longitude data after encryption, latitude data after GPS encryption at the second point, longitude data after GPS encryption at the third point, latitude data after GPS encryption at the third point...}.

[0031] When decrypting, the decryption algorithm matching the encryption terminal is also used to perform decryption.

Embodiment 2

[0033] Different from Embodiment 1, the second point and the GPS longitude data and latitude data of each point after the second point are encrypted in the following manner:

[0034] The longitude data and latitude data of the GPS at the second point; the longitude data of the second point is obtained by subtracting the longitude data of the first point from the longitude data of the second point, and the longitude data of the second point is obtained by subtracting the latitude data of the first point from the latitude data of the second point. Longitude data of the second point after encryption;

[0035] Encrypt the longitude data and latitude data of the third point GPS, subtract the longitude data of the second point from the longitude data of the third point to obtain the encrypted longitude data of the third point, and subtract the second point from the latitude data of the third point The longitude data of the third point after the point latitude data is encrypted;

[...

Embodiment 3

[0090] The difference from Embodiment 2 is that the mapping table is established differently. Each integer a' within the range of longitude has one and only one corresponding key value a1, and a1 is at least two characters in A-Z and a-z.

[0091] Each integer b' in the latitude range has one and only one corresponding key value b1, and b1 is at least two characters from A-Z and a-z.

[0092] The key values ​​corresponding to the integer part of the longitude data and latitude data of the same GPS point are the same or different.

[0093] In summary, the latitude and longitude coordinate encryption method of this application adopts an end-to-end system, which solves the transmission encryption problem of GPS points; in terms of security, only two endpoints of the mapping table are owned, and will not be exposed to the network, eliminating the existence of potential safety hazards ; In terms of flexibility, since the mapping table is customized, it has higher flexibility. The k...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of geographic coordinate information encryption, and specifically relates to a method for encrypting latitude and longitude coordinates, comprising the following steps: customizing a mapping table; encrypting end: obtaining the longitude data and latitude data of the first GPS point; corresponding to the integer part of the longitude data The mapping table performs mapping encryption, and the fractional part of the longitude data performs the quotient and remainder of the integer part of the longitude data in turn, and the longitude data obtained after encryption is: [the mapping character of the integer part, the quotient value, and the remainder value]; the same The latitude data obtained after the encryption is obtained by reasoning is: [the mapping character of the integer part, seeks the quotient value, seeks the residual value]; then the first point GPS data P after the encryption is: P={the longitude data after the encryption, the latitude after the encryption data}; decryption terminal: there is a decryption algorithm matching the encryption terminal. The method of the present application can satisfy the precise transmission of a large amount of data, and has a high degree of security performance.

Description

technical field [0001] The invention belongs to the field of geographic coordinate information encryption, and in particular relates to a method for encrypting latitude and longitude coordinates. Background technique [0002] With the rapid development of Internet technology, various GIS-based applications are blooming everywhere, bringing a lot of convenience to people's lives, such as real estate industry, insurance industry, logistics industry and other industries. There is competition in the development of any industry, so the problem arises: merchants or enterprises want to protect their data. The data here refers to latitude and longitude information. The GPS positioning system collects the latitude and longitude information of the vehicle's trajectory in real time. Manufacturers hope that their data will not be obtained by others. After all, the current network tools are becoming more and more powerful, or even if they are obtained by others, they cannot be decrypted....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G01S19/37
CPCG01S19/37H04L63/0428
Inventor 万栋新陈耀罗颖磊宋江波伏宜家
Owner CENNAVI TECH